cve/2023/CVE-2023-1717.md

19 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-1717](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1717)
![](https://img.shields.io/static/v1?label=Product&message=Bitrix24&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%2022.0.300%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1321%20Prototype%20Pollution&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
Prototype pollution in bitrix/templates/bitrix24/components/bitrix/menu/left_vertical/script.js in Bitrix24 22.0.300 allows remote attackers to execute arbitrary JavaScript code in the victims browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via polluting `__proto__[tag]` and `__proto__[text]`.
### POC
#### Reference
- https://starlabs.sg/advisories/23/23-1717/
#### Github
No PoCs found on GitHub currently.